-
A Guide to the Continuous Diagnostic and Mitigation Program by CISA
The goal of CISA's CDM program is to find and prioritize risks in cybersecurity, increasing visibility into the Federal cybersecurity space and improving the Government鈥檚 ability to respond to issues or threats.
Quantum Computing’s Latest Breakthrough: Why Government Encryption Standards Face a New, Unexpected Threat
The time to act is now鈥攅stablishing cryptographic leadership, conducting comprehensive inventories and securing appropriate resources are critical first steps for Quantum literacy.
Classified Data Spillage: Considerations for Risk Mitigation and Containment
Explore new considerations for how sensitive data can be protected against unintentional exposure, and how spillage is remediated when it occurs.
Unified Security Readiness During the Election Season
Through proper training and inter-organization communication, security industry leaders and Government agencies can help raise awareness on election-related challenges.
Securing Systems Through Segmentation and Zero Trust
Any complex AI-generated malware which will appear in the near future will also want to move across segments, and Illumio's Zero Trust strategy will protect the environment today against threats which will appear tomorrow.
Highlights from the SANS Government Security Forum on Zero Trust, CMMC Compliance and AI
Experts led discussions on key topics, including Zero Trust implementation, achieving Cybersecurity Maturity Model Certification (CMMC) compliance and harnessing artificial intelligence (AI).
The Role of Identity Governance in the Implementation of DoD Instruction 8520.04
As cyber threats continue to evolve, the integration of identity governance with access management protocols like those found in DoD Instruction 8520.04 will be crucial in maintaining the security and integrity of the DoD's information systems and the data they protect.
The 10 Cybersecurity Events for Government in 2024
Delve into cybersecurity excellence and empowerment for Government entities to navigate the digital landscape with confidence and resilience.
Securing Operational Technology with Cyber-Informed Engineering
Cyber-informed engineering recognizes the importance and necessity of using both engineering tools and conventional cybersecurity designs to secure OT networks.
Join Our Community